- (Exam Topic 4)
Your company has digitally signed applications.
You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) considers the digitally signed applications safe and never analyzes them.
What should you create in the Microsoft Defender Security Center?
Correct Answer:
D
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/manage-indicators
- (Exam Topic 4)
You have a Microsoft 365 subscription that uses a default domain named contoso.com. You have two users named User 1 and User2.
From the Security & Compliance admin center, you add User1 to the ediscovery Manager role group. From the Security & Compliance admin center, User1 creates a case named Case1
You need to ensure that User1 can add User2 as a case member. The solution must use the principle of least privilege.
To which role group should you add User2?
Correct Answer:
A
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/add-or-remove-members-from-a-case-in-advanced
- (Exam Topic 4)
You have a Microsoft 365 tenant that contains two users named User1 and User2. You create the alert policy shown in the following exhibit.
User2 runs a script that modifies a file in a Microsoft SharePoint Online library once every four minutes and runs for a period of two hours.
How many alerts will User1 receive?
Correct Answer:
D
- (Exam Topic 4)
Your company has a Microsoft E5 tenant.
The company must meet the requirements of the ISO/IEC 27001:2013 standard. You need to assess the company’s current state of compliance.
What should you use?
Correct Answer:
C
Reference:
https://docs.microsoft.com/en-us/compliance/regulatory/offering-iso-27001
- (Exam Topic 4)
You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com. You create a Microsoft Defender for identity instance Contoso.
The tenant contains the users shown in the following table.
You need to modify the configuration of the Defender for identify sensors.
Solutions: You instruct User1 to modify the Defender for identity sensor configuration. Does this meet the goal?
Correct Answer:
A